.DLLs Whenever an executable is launched, it will usually load a number of DLLs (Dynamic Link Libraries) that are required to function properly. These DLLs can provide functions, resources, and va...
Canary Tokens
Canary tokens are a great tool that defenders can use to detect malicious activity on their network. Canary tokens are files/alerting mechanism that makes a “phone home” to alert the creator that t...
Persistence and Profit within the Registry
The Registry The registry on Microsoft machines acts as a database to store low-level information for the system and its users. Introduced in Windows 3.1, the registry allows for persistence and ev...
A Dive into URI's
Primer Anytime you make a request in the browser, add an external link to a document, etc. Windows first checks what protocol is specified. The most common are web requests such as: https://github....
You sure you want to copy that?
Intro Pastejacking attacks are not a new concept in maldev, but still an extremely effective method that are making threat actors a dime. Essentially, a user copies a string from a seemingly truste...
- 1
- 1 / 1